Academia.eduAcademia.edu

Outline

On the limits of steganography

1998, Selected Areas in …

Abstract
sparkles

AI

Steganography, designed to conceal the existence of a message rather than its content, presents a unique challenge in the field of cryptography. This paper explores various ancient and modern techniques for steganography, the limitations posed by adversaries in the communication process, and introduces novel approaches such as public key steganography which may allow covert communication even under adverse conditions. A theoretical framework for understanding steganographic systems and the complications inherent in crafting a cohesive theory of information hiding are discussed, emphasizing the role of selection channels and error correction in secure communications.

Key takeaways
sparkles

AI

  1. Steganography conceals the existence of messages, unlike classical cryptography which hides content.
  2. Alice and Bob's steganographic communication relies on a shared secret key for embedding information.
  3. Efficient compression can undermine steganographic methods by removing redundant bits used for embedding.
  4. Using a one-time pad as a selection channel improves the security of embedded information.
  5. Public key steganography enables covert communication without a shared secret in active warden scenarios.